CATALANO, Dario
 Distribuzione geografica
Continente #
NA - Nord America 2.369
EU - Europa 1.198
AS - Asia 826
SA - Sud America 240
AF - Africa 101
OC - Oceania 9
Continente sconosciuto - Info sul continente non disponibili 3
Totale 4.746
Nazione #
US - Stati Uniti d'America 2.255
SG - Singapore 423
IT - Italia 342
CN - Cina 298
IE - Irlanda 269
BR - Brasile 221
UA - Ucraina 196
CA - Canada 100
RU - Federazione Russa 82
DE - Germania 81
SN - Senegal 65
FI - Finlandia 58
AT - Austria 45
FR - Francia 35
GB - Regno Unito 24
IN - India 19
CI - Costa d'Avorio 18
SE - Svezia 16
CZ - Repubblica Ceca 11
UZ - Uzbekistan 11
HK - Hong Kong 10
AR - Argentina 9
AU - Australia 9
BD - Bangladesh 9
KR - Corea 9
IQ - Iraq 8
MX - Messico 8
NL - Olanda 7
ES - Italia 6
TR - Turchia 6
CH - Svizzera 5
MA - Marocco 5
SA - Arabia Saudita 5
ZA - Sudafrica 5
DK - Danimarca 4
PK - Pakistan 4
VN - Vietnam 4
DZ - Algeria 3
EU - Europa 3
GR - Grecia 3
JP - Giappone 3
LU - Lussemburgo 3
RO - Romania 3
TW - Taiwan 3
AE - Emirati Arabi Uniti 2
AZ - Azerbaigian 2
BG - Bulgaria 2
CO - Colombia 2
DO - Repubblica Dominicana 2
EC - Ecuador 2
EG - Egitto 2
HN - Honduras 2
HU - Ungheria 2
JO - Giordania 2
LB - Libano 2
NG - Nigeria 2
NP - Nepal 2
PE - Perù 2
VE - Venezuela 2
BY - Bielorussia 1
CL - Cile 1
IL - Israele 1
KH - Cambogia 1
LI - Liechtenstein 1
LT - Lituania 1
PA - Panama 1
PS - Palestinian Territory 1
SK - Slovacchia (Repubblica Slovacca) 1
SY - Repubblica araba siriana 1
TN - Tunisia 1
TT - Trinidad e Tobago 1
UY - Uruguay 1
Totale 4.746
Città #
Santa Clara 611
Chandler 307
Dublin 269
Singapore 262
Jacksonville 199
Boardman 109
Catania 107
Nanjing 76
Andover 75
Toronto 75
Cambridge 72
Lawrence 69
Dakar 65
Ashburn 52
Nuremberg 52
Helsinki 48
Milan 43
Columbus 39
San Mateo 34
Des Moines 33
The Dalles 33
Chicago 32
Hefei 29
Council Bluffs 27
Saint Petersburg 27
Wilmington 25
Rome 24
Hebei 22
Jiaxing 20
Nanchang 20
Ottawa 19
Abidjan 18
Houston 16
Shenyang 16
São Paulo 14
Vienna 14
Beijing 13
Changsha 13
San Francisco 12
Tianjin 12
Los Angeles 11
Brooklyn 10
Jinan 9
Reggio Calabria 9
Seoul 9
Brno 8
Kunming 8
Guangzhou 7
Milazzo 7
Norwalk 7
Pune 7
Civitanova Marche 6
Hong Kong 6
Moscow 6
Palermo 6
Valverde 6
Washington 6
Zhengzhou 6
Belo Horizonte 5
Brasília 5
Dhaka 5
Frankfurt am Main 5
Giardini-Naxos 5
Messina 5
New York 5
Ningbo 5
Ravenna 5
Seattle 5
Tashkent 5
Aachen 4
Aci Catena 4
Campinas 4
Castiglione Olona 4
Cesa 4
Dallas 4
Fremont 4
Goiânia 4
Hangzhou 4
Johannesburg 4
Lappeenranta 4
London 4
Madrid 4
Maletto 4
Manchester 4
Melbourne 4
Munich 4
Niscemi 4
Paris 4
Rio de Janeiro 4
Shanghai 4
São José dos Campos 4
Atlanta 3
Bari 3
Borgosesia 3
Chennai 3
Curitiba 3
Florianópolis 3
Fort Worth 3
Grafing 3
Melzo 3
Totale 3.307
Nome #
Verifiable Pattern Matching on Outsourced Texts 106
Practical functional encryption for quadratic functions with applications to predicate encryption 98
Algebraic (trapdoor) one-way functions: Constructions and applications 95
MonZa: Fast Maliciously Secure Two Party Computation on Z_(2^k) 94
Fully non-interactive onion routing with forward secrecy 91
A certificateless approach to onion routing 82
Cramer-Damgard Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring 80
Zero-Knowledge Sets with Short Proofs 79
Algebraic (Trapdoor) One-Way Functions and Their Applications 78
Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions 78
Practical homomorphic MACs for arithmetic circuits 77
Trapdoor Hard-To-Invert Group Isomorphisms and their Applications to Password-based Authentication 76
A Color Opponency Watermarking Scheme for Digital Images 74
Coercion-Resistant Electronic Elections 72
Anamorphic Encryption: New Constructions and Homomorphic Realizations 71
On the security notions for homomorphic signatures 70
A Fair Micro-Payment Scheme for Profit Sharing in a P2P Network 69
A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and its Applications 68
Hybrid Commitments and their Applications to Zero Knowledge Proof Systems 68
Multi-input functional encryption for inner products: Function-hiding realizations and constructions without pairings 68
Homomorphic Signatures with Efficient Verification for Polynomial Functions. 66
Coercion-Resistant Electronic Elections 66
A Privacy-compliant Fingerprint Recognition System Based on Homomorphic Encryption and Fingercode Templates 66
Wildcarded Identity-Based Encryption 64
Privacy-Preserving Fingercode Authentication 64
Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results 64
Efficient Function-Hiding Functional Encryption: From Inner-Products to Orthogonality 64
Searchable Encryption Revisited: Consistency Conditions, Relation to Anonymous IBE, and Extensions 63
Paillier's Trapdoor Functions Hides up to O(N) bits 63
Labeled homomorphic encryption: Scalable and privacy-preserving processing of outsourced data 63
Fully Non-interactive Onion Routing with Forward-Secrecy 61
Computing inverses over a shared secret modulus 61
Practical Homomorphic Message Authenticators for Arithmetic Circuits 61
Efficient Distributed Computation Modulo a Shared Secret'' 60
Adaptive Pseudofree Groups and Their Applications 58
Cramer-Damgard Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring 58
An Efficient Algorithm for the Approximate Median Selection Problem 58
A P2P Market Place based on Aggregate Signatures 57
Multiparty Computation Method 56
Verifiable Random Functions from Identity based Key Encapsulation 56
Programmable Hash Functions Go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys 56
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions 55
Constant Round Authenticated Group Key Agreement via Distributed Computation 55
Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011 55
Inner-Product Functional Encryption with Fine-Grained Access Control 55
Off-line/on-line signatures revisited: A general unifying paradigm, efficient threshold variants and experimental results 55
Paillier's Cryptosystem Revisited 54
Vector commitments and their applications 54
Two-Party ECDSA from Hash Proof Systems and Efficient Instantiations 54
Bandwidth-Efficient Threshold EC-DSA 53
Certificateless Onion Routing 52
IPAKE: Isomorphisms for Pasword-based Authenticated Key Exchange 52
Robust watermarking for Images Based on Colors Manipulation 52
New efficient and secure protocols for Verifiable Signature Sharing and other applications 52
Double-authentication-preventing signatures in the standard model 51
Zero-Knowledge Sets with Short Proofs 51
Authenticating Computation on Groups: New Homomorphic Primitives and Applications. 51
Verifiable Pattern Matching on Outsourced Texts [2016] 51
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework 49
Using Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data 49
Identity Based Encryption Gone Wild 49
Preface [Security and cryptography for networks] 49
Metodo di multiparty computation 48
Homomorphic Signatures and Message Authentication Codes. SCN 2014: 514-519 48
Hybrid Trapdoor Commitments and their Applications 48
Learning SAT-k NF formulas from Membership queries 48
New efficient and secure protocols for Verifiable Signature Sharing and other applications 48
The Bit Security of Paillier's Encryption Scheme and its Applications 47
Mercurial Commitments: Minimal Assumptions and Efficient Constructions 46
The Hardness of Hensel Lifting: the Case of RSA and Discrete Logarithm 45
Efficient Network Coding Signatures in the Standard Model 43
Improved On-Line/Off-Line Threshold Signatures 43
Verifiable Random Functions: Relations to Identity-Based Key Encapsulation and New Constructions 42
Additive-Homomorphic Functional Commitments and Applications to Homomorphic Signatures 39
Adaptively Secure Single Secret Leader Election from DDH 39
Generalizing Homomorphic MACs for Arithmetic Circuits. 38
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness 38
Bandwidth-efficient threshold EC-DSA revisited: Online/offline extensions, identifiable aborts proactive and adaptive security 37
Double-authentication-preventing signatures in the standard model 37
On the Impossibility of Algebraic Vector Commitments in Pairing-Free Groups 33
Limits of Black-Box Anamorphic Encryption 33
Chainable Functional Commitments for Unbounded-Depth Circuits 30
Efficient and Universally Composable Single Secret Leader Election from Pairings 28
Robust watermarking for images based on color manipulation 27
Generic Anamorphic Encryption, Revisited: New Limitations and Constructions 10
Totale 4.872
Categoria #
all - tutte 17.783
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 17.783


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021311 3 35 45 2 121 5 35 1 37 2 17 8
2021/2022544 61 74 0 5 76 0 77 21 43 1 15 171
2022/2023912 71 39 20 72 81 162 1 188 229 8 31 10
2023/2024453 36 42 19 33 16 27 2 21 2 108 61 86
2024/20252.035 17 149 131 62 446 298 89 217 132 157 136 201
2025/202669 69 0 0 0 0 0 0 0 0 0 0 0
Totale 4.872